General

  • Target

    162c526f8992663dd44efe8e4246c0487ccedb8e721b4986ac1da1b5848b94e0

  • Size

    99KB

  • Sample

    220212-ely51ahcfn

  • MD5

    3d1077680d34ed9e6f5387ee63089d41

  • SHA1

    34fd292ef2405362b566172a015955657dbc4f59

  • SHA256

    162c526f8992663dd44efe8e4246c0487ccedb8e721b4986ac1da1b5848b94e0

  • SHA512

    0ef583a4d0a6584d6821a490770f5a77386d87b32e2a18fcb4fed0c55b9d7c3e1b55b10658b047a0b537992cc23135579445dc879d317aea2daca0f3834f3e9b

Malware Config

Targets

    • Target

      162c526f8992663dd44efe8e4246c0487ccedb8e721b4986ac1da1b5848b94e0

    • Size

      99KB

    • MD5

      3d1077680d34ed9e6f5387ee63089d41

    • SHA1

      34fd292ef2405362b566172a015955657dbc4f59

    • SHA256

      162c526f8992663dd44efe8e4246c0487ccedb8e721b4986ac1da1b5848b94e0

    • SHA512

      0ef583a4d0a6584d6821a490770f5a77386d87b32e2a18fcb4fed0c55b9d7c3e1b55b10658b047a0b537992cc23135579445dc879d317aea2daca0f3834f3e9b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks